Analysis
-
max time kernel
118s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
672a38cc7f6c3e9c218fbbee5b18a6b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
672a38cc7f6c3e9c218fbbee5b18a6b0N.exe
Resource
win10v2004-20240730-en
General
-
Target
672a38cc7f6c3e9c218fbbee5b18a6b0N.exe
-
Size
395KB
-
MD5
672a38cc7f6c3e9c218fbbee5b18a6b0
-
SHA1
fcd7199a0c1fa599004da4ee984a6356ed4d843a
-
SHA256
217510381096df978a1f6b86abc470c78f872a9007d7d3ed76ea3d4d38f40d84
-
SHA512
3751f68ddd9494c6240d7a4d90b6da3bc17461b8d3677e82446f5bde959faab4c83b8adde91aeaacf53ec73ad6cfbf061887754636a06d5caa5ef6dbf0959cdc
-
SSDEEP
6144:4jlYKRF/LReWAsUyXTJF7Y3GB/Ie7S2rputlncG8QaG6IqhBg6jwKAdI:4jauDReW/F0KtS29utlncrQaG6Rg6jT5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 defhq.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\defhq.exe" defhq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defhq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2216 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe 30 PID 3068 wrote to memory of 2216 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe 30 PID 3068 wrote to memory of 2216 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe 30 PID 3068 wrote to memory of 2216 3068 672a38cc7f6c3e9c218fbbee5b18a6b0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\672a38cc7f6c3e9c218fbbee5b18a6b0N.exe"C:\Users\Admin\AppData\Local\Temp\672a38cc7f6c3e9c218fbbee5b18a6b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\ProgramData\defhq.exe"C:\ProgramData\defhq.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5456b7b2393f8df84ed93aac7b3fcd31f
SHA1ccd999d19c8988dee6153873543e4413d9120282
SHA256477154a6ac248e1fc29f27c6445a526961cf81c78e476885ac272dfd3cc5af29
SHA5127aca312b08e41b7c6208a12781adebdb3104c63030dae82c5ed232e68130145427be1a9c3e8bc8dff67f3aa469f98236b57677efe05b55da46d31c239306ace3
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
258KB
MD5f8fd3bb1e0a949e81920829e0ec23a62
SHA1628c948ac66d0f8e1a670a8509eb15c54fe3daa7
SHA2561698e64972201261b36a1e914283d5bba494cc45283ab03d5c752c07cdabf83f
SHA512a910751e0adb1d45780008eec6637bc8bf3a811eb0a8676825151ada1c9b1302fa6ae0d18ee44f30fb33d3f662ca2ef78a1dfc7e7a9b705d833881e99db69fae